This IP address has been reported a total of 85
times from 61 distinct
sources.
142.93.219.213 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-11-06T07:40:20.970929+01:00 hera sshd[581738]: Invalid user plex from 142.93.219.213 port 54762 ... show more2024-11-06T07:40:20.970929+01:00 hera sshd[581738]: Invalid user plex from 142.93.219.213 port 54762
2024-11-06T07:40:21.218726+01:00 hera sshd[581738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-06T07:40:22.978205+01:00 hera sshd[581738]: Failed password for invalid user plex from 142.93.219.213 port 54762 ssh2
2024-11-06T07:40:21.218726+01:00 hera sshd[581738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-06T07:40:22.978205+01:00 hera sshd[581738]: Failed password for invalid user plex from 142.93.219.213 port 54762 ssh2
... show less
2024-11-06T07:09:59.482463+01:00 hera sshd[580449]: pam_unix(sshd:auth): authentication failure; log ... show more2024-11-06T07:09:59.482463+01:00 hera sshd[580449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-06T07:10:01.778697+01:00 hera sshd[580449]: Failed password for invalid user test from 142.93.219.213 port 52412 ssh2
2024-11-06T07:10:04.663629+01:00 hera sshd[580455]: Invalid user admin from 142.93.219.213 port 60722
2024-11-06T07:10:05.112649+01:00 hera sshd[580455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-06T07:10:07.232615+01:00 hera sshd[580455]: Failed password for invalid user admin from 142.93.219.213 port 60722 ssh2
... show less
2024-11-06T06:09:58.859564voip.dilenatech.com sshd[26863]: Invalid user test from 142.93.219.213 por ... show more2024-11-06T06:09:58.859564voip.dilenatech.com sshd[26863]: Invalid user test from 142.93.219.213 port 36326
2024-11-06T06:09:59.439580voip.dilenatech.com sshd[26863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-06T06:10:01.735760voip.dilenatech.com sshd[26863]: Failed password for invalid user test from 142.93.219.213 port 36326 ssh2
... show less
Nov 5 23:09:57 b146-27 sshd[222645]: Invalid user test from 142.93.219.213 port 47374
Nov 5 ... show moreNov 5 23:09:57 b146-27 sshd[222645]: Invalid user test from 142.93.219.213 port 47374
Nov 5 23:09:57 b146-27 sshd[222645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 5 23:10:00 b146-27 sshd[222645]: Failed password for invalid user test from 142.93.219.213 port 47374 ssh2
... show less
2024-11-06T06:20:45.231049+01:00 servidor1 sshd[296048]: Invalid user test from 142.93.219.213 port ... show more2024-11-06T06:20:45.231049+01:00 servidor1 sshd[296048]: Invalid user test from 142.93.219.213 port 60672
2024-11-06T06:20:45.499394+01:00 servidor1 sshd[296048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-06T06:20:46.927668+01:00 servidor1 sshd[296048]: Failed password for invalid user test from 142.93.219.213 port 60672 ssh2
2024-11-06T06:20:50.989755+01:00 servidor1 sshd[296051]: Invalid user admin from 142.93.219.213 port 40962
2024-11-06T06:20:51.394937+01:00 servidor1 sshd[296051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
2024-11-06T06:20:53.313870+01:00 servidor1 sshd[296051]: Failed password for invalid user admin from 142.93.219.213 port 40962 ssh2
2024-11-06T06:20:56.109904+01:00 servidor1 sshd[296122]: Invalid user omsagent from 142.93.219.213 port 49484
... show less
Detected multiple authentication failures and invalid user attempts from IP address 142.93.219.213 o ... show moreDetected multiple authentication failures and invalid user attempts from IP address 142.93.219.213 on [PT] A01 Node show less
2024-11-06T05:19:21.911921+00:00 DE-FFM-07 sshd[2671784]: Failed password for root from 142.93.219.2 ... show more2024-11-06T05:19:21.911921+00:00 DE-FFM-07 sshd[2671784]: Failed password for root from 142.93.219.213 port 43156 ssh2
2024-11-06T05:20:45.715146+00:00 DE-FFM-07 sshd[2680450]: Invalid user test from 142.93.219.213 port 38778
... show less
Nov 6 05:05:26 ubuntu sshd[678]: Failed password for invalid user elastic from 142.93.219.213 port ... show moreNov 6 05:05:26 ubuntu sshd[678]: Failed password for invalid user elastic from 142.93.219.213 port 58600 ssh2
Nov 6 05:05:25 ubuntu sshd[713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213 user=sys
Nov 6 05:05:27 ubuntu sshd[713]: Failed password for sys from 142.93.219.213 port 42480 ssh2
... show less
Nov 6 04:33:57 ubuntu sshd[125441]: Failed password for root from 142.93.219.213 port 58528 ssh2<br ... show moreNov 6 04:33:57 ubuntu sshd[125441]: Failed password for root from 142.93.219.213 port 58528 ssh2
Nov 6 04:33:58 ubuntu sshd[125441]: Connection closed by authenticating user root 142.93.219.213 port 58528 [preauth]
Nov 6 04:35:19 ubuntu sshd[125444]: Invalid user test from 142.93.219.213 port 50004
... show less
Nov 6 05:33:55 srv101 sshd[3712892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreNov 6 05:33:55 srv101 sshd[3712892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213 user=root
Nov 6 05:33:57 srv101 sshd[3712892]: Failed password for root from 142.93.219.213 port 36200 ssh2
Nov 6 05:35:19 srv101 sshd[3712922]: Invalid user test from 142.93.219.213 port 57228
Nov 6 05:35:19 srv101 sshd[3712922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.219.213
Nov 6 05:35:20 srv101 sshd[3712922]: Failed password for invalid user test from 142.93.219.213 port 57228 ssh2
... show less